UCF STIG Viewer Logo

The system must not accept source-routed IPv4 packets.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22414 GEN003607 SV-29713r1_rule ECSC-1 Medium
Description
Source-routed packets allow the source of the packet to suggest routers forward the packet along a different path than configured on the router, which can be used to bypass network security measures. This requirement applies only to the handling of source-routed traffic destined to the system itself, not to traffic forwarded by the system to another, such as when IPv4 forwarding is enabled and the system is functioning as a router.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2015-12-02

Details

Check Text ( C-36509r1_chk )
Check the system for an IP Filter (IPF) rule blocking incoming source-routed
packets.
# ipfstat -i

Examine the list for rules such as:
block in log quick all with opt lsrr
block in log quick all with opt ssrr

If the listed rules do not block incoming traffic with both lsrr
and ssrr options, this is a finding.
Fix Text (F-31869r1_fix)
Edit /etc/opt/ipf/ipf.conf and add rules to block incoming
source-routed packets, such as:

block in log quick all with opt lsrr
block in log quick all with opt ssrr

Reload the IPF rules.
# ipf -Fa -A -f /etc/opt/ipf/ipf.conf